Mark One Consultants Blog - IT news & technology tips

Our Channel

Sharing our news with you.

The world of IT moves fast - really fast. We have created this space so we can share with you the most relevant news, reviews and information from around the IT and Mark One world.

Content type

Content categories

Channel

 > 

Blog

 > 

News


This Business Owner Lost His Instagram Account

by Simon Wetherell - Thu 19 Jun 2025
News
Tips
MarkOne

How This Business Owner Lost His Instagram Account... And What You Need to Know to Stay Safe

At Mark One Consultants, we see digital security threats affecting businesses of all sizes on a regular basis. But nothing hits home more than a real-world example – and that's exactly what happened recently to a local business whose Instagram account was hacked in a highly professional, targeted attack. Despite having two-factor authentication (2FA) enabled, the hackers still managed to gain access, demonstrating just how sophisticated these threats have become.

We're sharing this story (anonymously, of course) not just to raise awareness, but to offer practical advice and insight into how you can protect your accounts – and what to do if the worst happens.

A Sophisticated Hack

The business owner first flagged the issue in a group message, explaining that his Instagram account had been compromised. The alarming detail? The attacker had bypassed 2FA. This naturally raised eyebrows, as 2FA is considered a strong defence against account takeovers.

As more information came to light, it became clear that the attack likely began with a phishing email, crafted to look like a standard Instagram alert. These emails often mimic legitimate notifications and can trick even tech-savvy users into taking the bait.

In this case, the attacker appears to have gained access to LastPass credentials via the phishing email. Since LastPass may store passwords and 2FA codes (depending on the setup), the hacker could then access both the Instagram account and the associated email account. With email access in hand, they likely changed recovery details (email and phone number) to lock the legitimate user out completely.

How the Hack Happened

While the exact method may vary from case to case, here's a breakdown of what likely occurred:

  1. Phishing email received, disguised as a legitimate alert from Instagram.
  2. User enters login details or LastPass credentials, thinking it's real.
  3. Hacker gains access to LastPass and email account.
  4. 2FA bypassed using recovery emails or device sync features.
  5. Instagram account hijacked, recovery info changed.
  6. Account details possibly sold on to other cybercriminals.

It's important to understand that some authentication methods are more secure than others. While SMS or WhatsApp-based 2FA can be intercepted or synced to other platforms, authentication apps like Microsoft Authenticator, Authy, or Okta Verify provide stronger protection.

Immediate Actions Taken

Thanks to input from knowledgeable contacts, the victim took quick and decisive action:

  • All passwords were changed immediately, starting with email and Instagram.
  • 2FA was re-enabled using a secure app instead of SMS or WhatsApp.
  • Linked accounts and devices were audited, with unknown sessions removed.
  • Recovery email and phone number settings were reviewed and corrected.
  • A full malware scan was run on the computer used to click the phishing link.
  • The email provider was contacted to help flag similar phishing attempts in future.

These steps are critical for anyone who has experienced a breach.

If you would like any help or guidance regarding cubersecurity, contact a member of the Mark One Consultants team.  


You might also be interested in...

Windows 10 End of Support

Windows 10 End of Support

Thu 13 Mar 2025
Is HDMI About to Be Replaced? GPMI, The Next Big Thing in Connectivity

Is HDMI About to Be Replaced? GPMI, The Next Big Thing in Connectivity

Fri 11 Apr 2025
Show more
Would you pass an IT MOT?

We have developed a detailed Measure of Technology (MOT) for your business that will analyse and review your IT infrastructure and provide you with a system health check. Once our qualified technician has completed the MOT you will receive a detailed report on your IT infrastructure, including; future advisories, minor defects, and system critical defects (SCD).

  • Performed by qualified technicians
  • Conducted face-to-face at your premises
  • Comprehensive report upon completion
  • 50% off for a limited time!